


default search action
25th CSF 2012: Cambridge, MA, USA
- Stephen Chong:

25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1918-8
Information-Flow Security I
- Daniel Hedin, Andrei Sabelfeld:

Information-Flow Security for a Core of JavaScript. 3-18 - Jeffrey A. Vaughan, Todd D. Millstein:

Secure Information Flow for Concurrent Programs under Total Store Order. 19-29 - Musard Balliu, Mads Dam, Gurvan Le Guernic

:
ENCoVer: Symbolic Exploration for Information Flow Security. 30-44 - John C. Mitchell

, Rahul Sharma, Deian Stefan, Joe Zimmerman:
Information-Flow Control for Programming on Encrypted Data. 45-60
Symbolic Protocol Verification I
- Alisa Pankova, Peeter Laud

:
Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings. 63-77 - Benedikt Schmidt, Simon Meier, Cas Cremers, David A. Basin

:
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties. 78-94 - Myrto Arapinis, Vincent Cheval

, Stéphanie Delaune:
Verifying Privacy-Type Properties in a Modular Way. 95-109
Access Control
- Anna Lisa Ferrara, P. Madhusudan, Gennaro Parlato

:
Security Analysis of Role-Based Access Control through Program Verification. 113-125 - Michele Bugliesi

, Stefano Calzavara
, Riccardo Focardi
, Marco Squarcina:
Gran: Model Checking Grsecurity RBAC Policies. 126-138 - Valerio Genovese, Deepak Garg, Daniele Rispoli:

Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction. 139-153
Systems Security
- Zhengqin Luo, Tamara Rezk:

Mashic Compiler: Mashup Sandboxing Based on Inter-frame Communication. 157-170 - Pieter Agten, Raoul Strackx, Bart Jacobs

, Frank Piessens:
Secure Compilation to Modern Processors. 171-185 - Gilles Barthe

, Gustavo Betarte, Juan Diego Campo, Carlos Luna:
Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization. 186-197 - Ralf Küsters, Tomasz Truderung, Juergen Graf:

A Framework for the Cryptographic Verification of Java-Like Programs. 198-212
Symbolic Protocol Verification II
- Barbara Kordy, Sasa Radomirovic

:
Constructing Optimistic Multi-party Contract Signing Protocols. 215-229 - Christoph Sprenger

, David A. Basin:
Refining Key Establishment. 230-246 - Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffeis

:
Discovering Concrete Attacks on Website Authorization by Formal Analysis. 247-262
Information Theory
- Mário S. Alvim

, Konstantinos Chatzikokolakis, Catuscia Palamidessi
, Geoffrey Smith:
Measuring Information Leakage Using Generalized Gain Functions. 265-279 - Pasquale Malacaria, Fabrizio Smeraldi:

The Thermodynamics of Confidentiality. 280-290
Information-Flow Security II
- Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld:

Securing Interactive Programs. 293-307 - Aslan Askarov, Stephen Chong:

Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies. 308-322
Proving Cryptography
- Bruno Blanchet:

Automatically Verified Mechanized Proof of One-Encryption Key Exchange. 325-339 - Marion Daubignard, Pierre-Alain Fouque

, Yassine Lakhnech:
Generic Indifferentiability Proofs of Hash Designs. 340-353 - Michael Backes, Gilles Barthe

, Matthias Berg, Benjamin Grégoire, César Kunz, Malte Skoruppa, Santiago Zanella-Béguelin:
Verified Security of Merkle-Damgård. 354-368 - Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:

Provably Secure and Practical Onion Routing. 369-385

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














